1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
coldgirl [10]
3 years ago
7

How Java provides protection through stack inspection approach ?

Computers and Technology
1 answer:
Natalija [7]3 years ago
3 0
Pecting Java<span> 2's </span>stack inspection<span> policy to be enforced can-. not execute on .... Figure 2. PSLang security policy that </span>allows<span> at most 10 open windows. .... </span>Method<span> call/return: A → B. At start of B, look up</span>protection<span> domain PB for B's. code and push PB on the thread-local domain-. </span>Stack<span>. At return from B (either normally or by.</span>
You might be interested in
To access WordPad, Jill will click on Start, All Programs, Accessories, and WordPad. To access Notepad, Karl will click on Start
NARA [144]
The answer is B, Both Jill and Karl are correct.
7 0
3 years ago
Give the appropriate term for each of the following.1. An easy-to-remember address for calling a web page (like www.code.org). 2
Nimfa-mama [501]

Answer:

1. URL (Universal Resource Locator)

2. DNS (Domain Name System)

3. Network

4. Packets

5. The Internet Engineering Task Force (IETF)

6. Bit

7. HTTP (Hypertext Transfer Protocol)

8. Protocol

Explanation:

1. "URL is the address of a World Wide Web page."

2. "DNS: The service that translates URLs to IP addresses. IP Address: A number assigned to any item that is connected to the Internet."

3. "A network is defined as a group of two or more computer systems linked together."

4. "In Information technology, a packet is collection of data that can be used by computers which need to communicate with each other, usually as part of a network."

5. "The Internet Engineering Task Force is an open standards organization, which develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite."

6. "A bit (short for binary digit) is the smallest unit of data in a computer. A bit has a single binary value, either 0 or 1"

7. "Hypertext Transfer Protocol provides a network protocol standard that web browsers and servers use to communicate."

8. "A network protocol defines rules and conventions for communication between network devices. Network protocols include mechanisms for devices to identify and make connections with each other, as well as formatting rules that specify how data is packaged into sent and received messages."

Hope this helps! <3

4 0
4 years ago
What is the most popular gaming computer brand rn, 2022
tankabanditka [31]

Answer:

hp/omen  or  SONY

Explanation:

because hp has been making a lot better computers, and possibly SONY because the ps5 release that came out a couple years ago.

4 0
2 years ago
Read 2 more answers
Using recursion, write a program that asks a user to enter the starting coordinates (row, then column), the ending coordinates (
Luden [163]

Answer:

The program in Python is as follows

def Paths(row,col):

if row ==0 or col==0:

 return 1

return (Paths(row-1, col) + Paths(row, col-1))

row = int(input("Row: "))

col = int(input("Column: "))

print("Paths: ", Paths(row,col))

Explanation:

This defines the function

def Paths(row,col):

If row or column is 0, the function returns 1

<em> if row ==0 or col==0: </em>

<em>  return 1 </em>

This calls the function recursively, as long as row and col are greater than 1

<em> return (Paths(row-1, col) + Paths(row, col-1))</em>

The main begins here

This prompts the user for rows

row = int(input("Row: "))

This prompts the user for columns

col = int(input("Column: "))

This calls the Paths function and prints the number of paths

print("Paths: ", Paths(row,col))

4 0
3 years ago
Alicia has filed a complaint regarding a serious hazard that could result in a fatality or serious injury. How will OSHA most li
Galina-37 [17]

osha will insist that the hazard be removed within x amount of time. if there is no compliance,the company will face a hefty fine and possible closure of a facility.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following combinations would constitute a vertical merger?
    12·1 answer
  • The following code in a different program is not working properly. The message should display the value of the intCounter variab
    14·1 answer
  • How can we get the number of records or rows in a table using MySQL? *
    8·1 answer
  • Icons for the most commonly used applications on a Mac can be found here. Dock Menu bar Toolbar Toolbox
    13·2 answers
  • What was the second phone made in the world called?
    5·1 answer
  • So a little back story. I'm pretty young won't say my age because I'll be judged. But I drink deer, vodlka, tequila, etc. I some
    11·2 answers
  • _____ involves identifying and controlling the functional and physical design characteristics of products and their support docu
    15·1 answer
  • “Artificial intelligence is the tool of education in the near future”. Research on the possibility of “AI technology” in scienti
    15·1 answer
  • Which of the following statements is true of satellite internet access?
    13·1 answer
  • Please help me i’ll give you brainlist
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!